[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20180927150544.14632-1-qader.aymen@gmail.com>
Date: Thu, 27 Sep 2018 16:05:44 +0100
From: Aymen Qader <qader.aymen@...il.com>
To: unlisted-recipients:; (no To-header on input)
Cc: Wolfram Sang <wsa@...-dreams.de>,
Aymen Qader <qader.aymen@...il.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
devel@...verdev.osuosl.org, linux-kernel@...r.kernel.org
Subject: [PATCH] staging: ks7010: Add null pointer check for skb
Add a null pointer check for the socket buffer in ks_hostif.c to avoid a
possible null pointer deference.
Signed-off-by: Aymen Qader <qader.aymen@...il.com>
---
drivers/staging/ks7010/ks_hostif.c | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/drivers/staging/ks7010/ks_hostif.c b/drivers/staging/ks7010/ks_hostif.c
index 0e554e3359b5..4a5bc7858ef7 100644
--- a/drivers/staging/ks7010/ks_hostif.c
+++ b/drivers/staging/ks7010/ks_hostif.c
@@ -1011,6 +1011,11 @@ int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *skb)
size_t size;
int ret;
+ if(!skb) {
+ ret = -ENOMEM;
+ goto err_kfree;
+ }
+
skb_len = skb->len;
if (skb_len > ETH_FRAME_LEN) {
netdev_err(priv->net_dev, "bad length skb_len=%d\n", skb_len);
--
2.17.1
Powered by blists - more mailing lists